Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe
Resource
win10v2004-20240226-en
General
-
Target
e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe
-
Size
200KB
-
MD5
652164ec33cbdd05994b6b534d32c38c
-
SHA1
7d65f2c8b6b9f7c4f962ec9b0671a4d4a51ef23c
-
SHA256
e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02
-
SHA512
d3d91d005e6c9a64b820b6d95b12458f90d172ff8ed9cba76cf19e514829f3695b2068b3dded1024e51326f7ff8c561d88b24f39c81ba6031325ca133fd107d3
-
SSDEEP
6144:wf0VcYHEyAUrj/3/4rA/bPSdMlZnLAJG1B7u:G0bhT/lbkMUG1BC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4736 e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe -
Executes dropped EXE 1 IoCs
pid Process 4736 e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3700 5056 WerFault.exe 88 3284 4736 WerFault.exe 96 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5056 e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4736 e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4736 5056 e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe 96 PID 5056 wrote to memory of 4736 5056 e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe 96 PID 5056 wrote to memory of 4736 5056 e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe"C:\Users\Admin\AppData\Local\Temp\e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 3962⤵
- Program crash
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exeC:\Users\Admin\AppData\Local\Temp\e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 3643⤵
- Program crash
PID:3284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5056 -ip 50561⤵PID:3248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4736 -ip 47361⤵PID:1928
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e93d922dc925dec6094dc41d1799677f709b42ed566eb66e24c2e7b621134a02.exe
Filesize200KB
MD5842f647c499938697d21c4b52a4a6ed3
SHA1fa2d50c1131ff29f0764578355894fa152d44b7b
SHA25684c17a71d8d0b6d47805dce11b21cc11704a5f3e6fe31f6a1cae601652ed0ec8
SHA5127492a41ac8591f7d8539b0f8257ffa1753b0bb6d608bc49d77bc6d4e7c23153fce7033b4169c2542555dc80163ca316e8f4a6b490ec3b1ca9f82ddf0fe7f8f89